Lucene search

K
centosCentOS ProjectCESA-2007:0486-01
HistoryJun 18, 2007 - 11:45 p.m.

mod_perl security update

2007-06-1823:45:32
CentOS Project
lists.centos.org
43

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.006 Low

EPSS

Percentile

77.8%

CentOS Errata and Security Advisory CESA-2007:0486-01

Mod_perl incorporates a Perl interpreter into the Apache web server,
so that the Apache HTTP server can directly execute Perl code.

The Apache::PerlRun module was found to not properly escape PATH_INFO
before being used in a regular expression. If a server is configured to
use Apache::PerlRun, an attacker could request a carefully crafted URI
causing resource consumption, which could lead to a denial of service
(CVE-2007-1349).

Users of mod_perl should update to these erratum packages which contain a
backported fix to correct this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-June/076133.html

Affected packages:
mod_perl

OSVersionArchitecturePackageVersionFilename
CentOS2i386mod_perl< 1.26-8.el2mod_perl-1.26-8.el2.i386.rpm

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.006 Low

EPSS

Percentile

77.8%